Insurgency

Last updated
A Home Army insurgent next to a propaganda poster during the 1944 Warsaw Uprising Warsaw Uprising poster 345.jpg
A Home Army insurgent next to a propaganda poster during the 1944 Warsaw Uprising

An insurgency is a violent, armed rebellion by small, lightly armed bands who practice guerrilla warfare against a larger authority. [1] [2] [3] The key descriptive feature of insurgency is its asymmetric nature: small irregular forces face a large, well-equipped, regular military force state adversary. [4] Due to this asymmetry, insurgents avoid large-scale direct battles, opting instead to blend in with the civilian population (mainly in the countryside) where they gradually expand territorial control and military forces. [4] Insurgency frequently hinges on control of and collaboration with local populations. [4] [5]

Contents

An insurgency can be fought via counter-insurgency warfare, as well as other political, economic and social actions of various kinds. [6] Due to the blending of insurgents with the civilian population, insurgencies tend to involve considerable violence against civilians (by the state and the insurgents). [4] State attempts to quell insurgencies frequently lead to the infliction of indiscriminate violence, whereas rebel control of territory frequently involves violence against the civilian population. [5] Insurgency sets itself apart from terrorism by aiming for political control rather than resorting to indiscriminate violence, [7] however, it may incorporate terrorist tactics.[ citation needed ]

Where a revolt takes the form of armed rebellion, it may not be viewed as an insurgency if a state of belligerency exists between one or more sovereign states and rebel forces. For example, during the American Civil War, the Confederate States of America was not recognized as a sovereign state, but it was recognized as a belligerent power, and thus Confederate warships were given the same rights as United States warships in foreign ports. [8] [9] [10]

Sometimes there may be two or more simultaneous insurgencies (multipolar) occurring in a country. The Iraq insurgency is one example of a recognized government [lower-alpha 1] versus multiple groups of insurgents. Other historic insurgencies, such as the Russian Civil War, have been multipolar rather than a straightforward model made up of two sides. During the Angolan Civil War there were two main sides: MPLA and UNITA. At the same time, there was another separatist movement for the independence of the Cabinda region headed up by FLEC. Multipolarity extends the definition of insurgency to situations where there is no recognized authority, as in the Somali Civil War, especially the period from 1998 to 2006, where it broke into quasi-autonomous smaller states, fighting among one another in changing alliances.

Definition

The so-called kuruc were armed anti-Habsburg rebels in Royal Hungary between 1671 and 1711. Kuruc labanc csatajelenet1.jpg
The so-called kuruc were armed anti-Habsburg rebels in Royal Hungary between 1671 and 1711.

James Fearon and David Laitin define insurgency as "a technology of military conflict characterized by small, lightly armed bands practicing guerrilla warfare from rural base areas." [1] [11] Austin Long defines insurgency as "the use of political and military means by irregular forces to change an existing political order. These forces typically mingle with civilians in order to hide from the forces defending the political order." [12] According to Matthew Adam Kocher, Thomas Pepinsky and Stathis Kalyvas, a central objective in insurgencies is to achieve control over civilians. [4] To exercise control armed groups apply a variety of practices, including different types of violence, dispute resolution, taxation, regulation of movement, access to aid and services, and social strictures. [13]

Insurgency and civil wars

According to James D. Fearon, wars have a rationalist explanation behind them, which explains why leaders prefer to gamble in wars and avoid peaceful bargains. [14] Fearon states that intermediate bargains can be a problem because countries cannot easily trade territories with the spread of nationalism. [14] Furthermore, wars can take the form of civil wars. In her article Why Bad Governance Leads to Civil Wars, Barbara F. Walter has presented a theory that explains the role of strong institutions in preventing insurgencies that can result in civil wars. Walter believes that institutions can contribute to four goals. [15]

Institutions are responsible for checking the government, creating multiple peaceful routes to help the government solve problems, making the government committed to political terms that entails preserving peace, and creating an atmosphere where rebels do not need to form militias. [15] Furthermore, Walter adds that if there is a conflict between the government and the insurgents in the form of a civil war, that can bring about a new government that is accountable to a wider range of people, who have to commit to a compromise in political bargains. According to Walter, the presence of strong influential institutions can be beneficial to prevent the repetition of civil wars, but autocratic governments are less likely to accept the emergence of strong institutions because of their resulting constraint of governmental corruption and privileges.

In her book, Insurgent Collective Action and Civil War in Salvador, Elisabeth Jean Wood explains that participants in high-risk activism are very aware of the costs and benefits of engaging in civil wars. [16] Wood suggests that "participants in the 1964 Freedom Summer campaign in the US South ran high risks of bodily harm in challenging the long-standing practices of racial exclusion in Mississippi." There are many selective incentives that encourage insurgency and violent movements against autocratic political regimes. For example, the supply of safety as a material good can be provided by the insurgents, which abolishes the exploitation of the government and thus forms one of the main incentives. The revolutionary power can help manifest a social-political network that in return provides access to political opportunities to diverse candidates, who share a collective identity and cultural homogeneity. Also, civil wars and insurgencies can provide employment and access to services and resources that were once taken over by the autocratic regimes. [16]

Tactics

Insurgencies differ in their use of tactics and methods. In a 2004 article, Robert R. Tomes spoke of four elements that "typically encompass an insurgency": [17]

  1. cell-networks that maintain secrecy
  2. terrorism used to foster insecurity among the population and drive them to the insurgents for protection
  3. multifaceted attempts to cultivate support in the general population, often by undermining the new regime
  4. attacks against the government

Tomes' is an example of a definition that does not cover all insurgencies. For example, the French Revolution had no cell system, and in the American Revolution, little to no attempt was made to terrorize civilians.[ citation needed ] In consecutive coups in 1977 and 1999 in Pakistan, the initial actions focused internally on the government rather than on seeking broad support. While Tomes' definition fits well with Mao's Phase I, [18] it does not deal well with larger civil wars. Mao does assume terrorism is usually part of the early phases, but it is not always present in revolutionary insurgency.

Tomes offers an indirect definition of insurgency, drawn from Trinquier's definition of counterinsurgency: "an interlocking system of actions—political, economic, psychological, military—that aims at the [insurgents' intended] overthrow of the established authority in a country and its replacement by another regime." [19]

Steven Metz [20] observes that past models of insurgency do not perfectly fit modern insurgency, in that current instances are far more likely to have a multinational or transnational character than those of the past. Several insurgencies may belong to more complex conflicts, involving "third forces (armed groups which affect the outcome, such as militias) and fourth forces (unarmed groups which affect the outcome, such as international media), who may be distinct from the core insurgents and the recognized government. While overt state sponsorship becomes less common, sponsorship by transnational groups is more common. "The nesting of insurgency within complex conflicts associated with state weakness or failure..." (See the discussion of failed states below.) Metz suggests that contemporary insurgencies have far more complex and shifting participation than traditional wars, where discrete belligerents seek a clear strategic victory.

Terrorism

Many insurgencies include terrorism. While there is no accepted definition of terrorism in international law, United Nations-sponsored working definitions include one drafted by Alex P. Schmid for the Policy Working Group on the United Nations and Terrorism. Reporting to the Secretary-General in 2002, the Working Group stated the following:

Without attempting a comprehensive definition of terrorism, it would be useful to delineate some broad characteristics of the phenomenon. Terrorism is, in most cases, essentially a political act. It is meant to inflict dramatic and deadly injury on civilians and to create an atmosphere of fear, generally for a political or ideological (whether secular or religious) purpose. Terrorism is a criminal act, but it is more than mere criminality. To overcome the problem of terrorism it is necessary to understand its political nature as well as its basic criminality and psychology. The United Nations needs to address both sides of this equation. [21]

Yet another conflict of definitions involves insurgency versus terrorism. The winning essay of the 24th Annual United States Chairman of the Joint Chiefs of Staff Strategic Essay Contest, by Michael F. Morris, said [A pure terrorist group] "may pursue political, even revolutionary, goals, but their violence replaces rather than complements a political program." [22] Morris made the point that the use, or non-use, of terrorism does not define insurgency, "but that organizational traits have traditionally provided another means to tell the two apart. Insurgencies normally field fighting forces orders of magnitude larger than those of terrorist organizations." Insurgencies have a political purpose, and may provide social services and have an overt, even legal, political wing. Their covert wing carries out attacks on military forces with tactics such as raids and ambushes, as well as acts of terror such as attacks that cause deliberate civilian casualties.

Mao considered terrorism a basic part of his first part of the three phases of revolutionary warfare. [18] Several insurgency models recognize that completed acts of terrorism widen the security gap; the Marxist guerrilla theoretician Carlos Marighella specifically recommended acts of terror, as a means of accomplishing something that fits the concept of opening the security gap. [23] Mao considered terrorism to be part of forming a guerrilla movement.

Subversion

While not every insurgency involves terror, most involve an equally hard to define tactic, subversion. "When a country is being subverted it is not being outfought; it is being out-administered. Subversion is literally administration with a minus sign in front." [24] The exceptional cases of insurgency without subversion are those where there is no accepted government that is providing administrative services.

While the term "subversion" is less commonly used by current U.S. spokesmen, that may be due to the hyperbolic way it was used in the past, in a specifically anticommunist context. U.S. Secretary of State Dean Rusk did in April 1962, when he declared that urgent action was required before the "enemy's subversive politico-military teams find fertile spawning grounds for their fish eggs." [25]

In a Western context, Rosenau cites a British Secret Intelligence Service definition as "a generalized intention to (emphasis added) "overthrow or undermine parliamentary democracy by political, industrial or violent means." While insurgents do not necessarily use terror, it is hard to imagine any insurgency meeting its goals without undermining aspects of the legitimacy or power of the government or faction it opposes. Rosenau mentions a more recent definition that suggests subversion includes measures short of violence, which still serve the purposes of insurgents. [25] Rarely, subversion alone can change a government; this arguably happened in the liberalization of Eastern Europe.[ citation needed ] To the Communist government of Poland, Solidarity appeared subversive but not violent.[ citation needed ]

Political rhetoric, myths and models

In arguing against the term Global War on Terror, Francis Fukuyama said the United States was not fighting terrorism generically, as in Chechnya or Palestine. Rather, he said the slogan "war on terror" is directed at "radical Islamism, a movement that makes use of culture for political objectives." He suggested it might be deeper than the ideological conflict of the Cold War, but it should not be confused with Samuel Huntington's "clash of civilizations." Addressing Huntington's thesis, [26] Fukuyama stressed that the US and its allies need to focus on specific radical groups rather than clash with global Islam.

Fukuyama argued that political means, rather than direct military measures, are the most effective ways to defeat that insurgency. [27] David Kilcullen wrote "We must distinguish Al Qa'eda and the broader militant movements it symbolises – entities that use terrorism – from the tactic of terrorism itself." [28]

There may be utility in examining a war not specifically on the tactic of terror but in co-ordination among multiple national or regional insurgencies. It may be politically infeasible to refer to a conflict as an "insurgency" rather than by some more charged term, but military analysts, when concepts associated with insurgency fit, should not ignore those ideas in their planning. Additionally, the recommendations can be applied to the strategic campaign, even if it is politically unfeasible to use precise terminology. [29] Insurgent groups often struggle to maintain coherency and authority due to their decentralized nature, and thus rely heavily upon ethnic, religious, or ideological bounds to avoid splintering. [30]

While it may be reasonable to consider transnational insurgency, Anthony Cordesman points out some of the myths in trying to have a worldwide view of terror: [31]

Social scientists, soldiers, and sources of change have been modeling insurgency for nearly a century if one starts with Mao. [18] Counterinsurgency models, not mutually exclusive from one another, come from Kilcullen, McCormick, Barnett and Eizenstat. Kilcullen describes the "pillars" of a stable society, while Eizenstat addresses the "gaps" that form cracks in societal stability. McCormick's model shows the interplay among the actors: insurgents, government, population and external organizations. Barnett discusses the relationship of the country with the outside world, and Cordesman focuses on the specifics of providing security.

Recent studies have tried to model the conceptual architecture of insurgent warfare using computational and mathematical modelling. A recent study by Juan Camilo Bohorquez, Sean Gourley, Alexander R. Dixon, Michael Spagat, and Neil F. Johnson entitled "Common Ecology Quantifies Human Insurgency", suggests a common structure for 9 contemporary insurgent wars, supported on statistical data of more than 50,000 insurgent attacks. [32] The model explains the recurrent statistical pattern found in the distribution of deaths in insurgent and terrorist events. [33]

Kilcullen's pillars

Kilcullen Figure 1: Ecosystem of Insurgency KilcullenEcosystem.png
Kilcullen Figure 1: Ecosystem of Insurgency
Kilcullen's Three Pillars Kilcullen3Pillars.svg
Kilcullen's Three Pillars

Kilcullen describes a framework for counterinsurgency. He gives a visual overview [34] of the actors in his model of conflicts, which he represents as a box containing an "ecosystem" defined by geographic, ethnic, economic, social, cultural, and religious characteristics. Inside the box are, among others, governments, counterinsurgent forces, insurgent leaders, insurgent forces, and the general population, which is made up of three groups:

  1. those committed to the insurgents;
  2. those committed to the counterinsurgents;
  3. those who simply wish to get on with their lives.

Often, but not always, states or groups that aid one side or the other are outside the box. Outside-the-box intervention has dynamics of its own. [35]

The counterinsurgency strategy can be described as efforts to end the insurgency by a campaign developed in balance along three "pillars": security, political, and economical.

"Obviously enough, you cannot command what you do not control. Therefore, unity of command (between agencies or among government and non-government actors) means little in this environment." Unity of command is one of the axioms of military doctrine [36] that change with the use of swarming:. [37] In Edwards' swarming model, as in Kilcullen's mode, unity of command becomes " unity of effort at best, and collaboration or deconfliction at least." [34]

As in swarming, in Kilcullen's view unity of effort "depends less on a shared command and control hierarchy, and more on a shared diagnosis of the problem (i.e., the distributed knowledge of swarms), platforms for collaboration, information sharing and deconfliction. Each player must understand the others' strengths, weaknesses, capabilities and objectives, and inter-agency teams must be structured for versatility (the ability to perform a wide variety of tasks) and agility (the ability to transition rapidly and smoothly between tasks)."

Eizenstat and closing gaps

Insurgencies, according to Stuart Eizenstat grow out of "gaps". [38] To be viable, a state must be able to close three "gaps", of which the first is most important:

Note the similarity between Eizenstat's gaps and Kilcullen's three pillars. [34] In the table below, do not assume that a problematic state is unable to assist less developed states while closing its own gaps.

Rough classification of states[ original research? ][ citation needed ]
State typeNeedsRepresentative examples
Militarily strong but weak in other institutionsLower tensions before working on gaps Cuba, North Korea
Good performersContinuing development of working institutions. Focused private investment El Salvador, Ghana, Mongolia, Senegal, Nicaragua, Uganda
Weak statesClose one or two gaps Afghanistan, Egypt, Indonesia, Iraq, Ivory Coast, Kazakhstan, Pakistan, Philippines, Kyrgyzstan, Myanmar, Republic of the Congo, Sudan, Syria, Tajikistan, Uzbekistan, Zimbabwe
Failed statesClose all gaps Angola, the Democratic Republic of the Congo, Haiti, Liberia, Palestine, Somalia

McCormick Magic Diamond

McCormick's model [41] is designed as a tool for counterinsurgency (COIN), but develops a symmetrical view of the required actions for both the Insurgent and COIN forces to achieve success. In this way the counterinsurgency model can demonstrate how both the insurgent and COIN forces succeed or fail. The model's strategies and principle apply to both forces, therefore the degree the forces follow the model should have a direct correlation to the success or failure of either the Insurgent or COIN force.

McCormick insurgency model COIN-McCormick.png
McCormick insurgency model

The model depicts four key elements or players:

  1. Insurgent force
  2. Counterinsurgency force (i.e., the government)
  3. Population
  4. International community

All of these interact, and the different elements have to assess their best options in a set of actions:

  1. Gaining support of the population
  2. Disrupt opponent's control over the population
  3. Direct action against opponent
  4. Disrupt opponent's relations with the international community
  5. Establish relationships with the international community

Barnett and connecting to the core

In Thomas Barnett's paradigm, [42] the world is divided into a "connected core" of nations enjoying a high level of communications among their organizations and individuals, and those nations that are disconnected internally and externally. In a reasonably peaceful situation, he describes a "system administrator" force, often multinational, which does what some call "nation-building", but, most importantly, connects the nation to the core and empowers the natives to communicate—that communication can be likened to swarm coordination. If the state is occupied, or in civil war, another paradigm comes into play: the leviathan, a first-world military force that takes down the opposition regular forces. Leviathan is not constituted to fight local insurgencies, but major forces. Leviathan may use extensive swarming at the tactical level, but its dispatch is a strategic decision that may be made unilaterally, or by an established group of the core such as NATO or ASEAN.

Cordesman and security

Other than brief "Leviathan" takedowns, security building appears to need to be regional, with logistical and other technical support from more developed countries and alliances (e.g., ASEAN, NATO). Noncombat military assistance in closing the security gap begins with training, sometimes in specialized areas such as intelligence. More direct, but still noncombat support, includes intelligence, planning, logistics and communications.

Anthony Cordesman notes that security requirements differ by region and state in region. Writing on the Middle East, he identified different security needs for specific areas, as well as the US interest in security in those areas. [31]

It is well to understand that counterterrorism, as used by Cordesman, does not mean using terrorism against the terrorism, but an entire spectrum of activities, nonviolent and violent, to disrupt an opposing terrorist organization. The French general, Joseph Gallieni, observed, while a colonial administrator in 1898,

A country is not conquered and pacified when a military operation has decimated its inhabitants and made all heads bow in terror; the ferments of revolt will germinate in the mass and the rancours accumulated by the brutal action of force will make them grow again [43]

Both Kilcullen and Eizenstat define a more abstract goal than does Cordesman. Kilcullen's security pillar is roughly equivalent to Eizenstat's security gap:

This pillar most engages military commanders' attention, but of course military means are applied across the model, not just in the security domain, while civilian activity is critically important in the security pillar also ... all three pillars must develop in parallel and stay in balance, while being firmly based in an effective information campaign. [34]

Anthony Cordesman, while speaking of the specific situation in Iraq, makes some points that can be generalized to other nations in turmoil. [44] Cordesman recognizes some value in the groupings in Samuel P. Huntington's idea of the clash of civilizations, [26] but, rather assuming the civilizations must clash, these civilizations simply can be recognized as actors in a multinational world. In the case of Iraq, Cordesman observes that the burden is on the Islamic civilization, not unilaterally the West, if for no other reason that the civilization to which the problematic nation belongs will have cultural and linguistic context that Western civilization cannot hope to equal.

The heart of strengthening weak nations must come from within, and that heart will fail if they deny that the real issue is the future of their civilization, if they tolerate religious, cultural or separatist violence and terrorism when it strikes at unpopular targets, or if they continue to try to export the blame for their own failures to other nations, religions, and cultures.

Asymmetric and irregular conflicts

Asymmetric conflicts (or irregular conflicts), as the emerging type of insurgencies in recent history, is described by Berman and Matanock in their review as conflicts where "the government forces have a clear advantage over rebels in coercive capacity." [45] In this kind of conflicts, rebel groups can reintegrate into the civilian population after an attack if the civilians are willing to silently accept them. Some of the most recent examples include the conflicts in Afghanistan and Iraq. [46] As the European countries intervenes in the conflicts, creating asymmetry between the government forces and rebels, asymmetric conflict is the most common form of subnational conflicts and the most civil conflicts where the western countries are likely to be involved. Such interventions and their impacts can be seen in the NATO operation in Libya in 2011 and the French-led intervention in Mali in 2013. [45]

Berman and Matanock suggested an information-centric framework to describe asymmetric conflicts on a local level. [45] Three parties are involved in framework: government forces, rebels and civilians. Government forces and rebels attack each other and may inadvertently harm civilians whereas civilians can anonymously share local information with government forces, which would allow government forces to effectively use their asymmetric advantage to target rebels. Taking the role of civilians in this framework into consideration, the government and rebels will divert resources to provide services to civilians so as to influence their decision about sharing information with the government.

The framework is based on several assumptions:

This framework leads to five major implications for counterinsurgency strategies:

  1. The government and rebels have an incentive to provide services to civilians, which increases with the value of the information shared.
  2. Rebel violence may be reduced by service provision from the government.
    • Projects that address the needs of the civilians in the local communities and conditioned on information sharing by the community are more effective in reducing rebel violence. In practice, these may be smaller projects that are developed through consultation with local communities, which are also more easily revoked when information is not shared.
    • Innovations that increase the value of projects to local civilians, such as including development professionals in project design and implementation, will enhance the effect of violence-reducing.
  3. Security provided by the government and service provision (i.e. development spending) are complementary activities.
  4. If either side of the government forces or rebels causes casualties among civilians, civilians will reduce their support for that side.
  5. Innovations that make anonymous tips to the government easier, of which are often technical, can reduce rebel violence.

These implications are tested by empirical evidences from conflicts in Afghanistan, Iraq and several other subnational conflicts. Further research on governance, rule of law, attitudes, dynamics and agency between allies are needed to better understand asymmetric conflicts and to have better informed decisions made at the tactical, strategic and public policy levels.

Counter-insurgency

Nigerian Army counterinsurgency forces demonstrating tactics used against Boko Haram, 2016 Nigerian Army Boko Haram demonstration.jpg
Nigerian Army counterinsurgency forces demonstrating tactics used against Boko Haram, 2016

Before one counters an insurgency, one must understand what one is countering. Typically the most successful counter-insurgencies have been the British in the Malay Emergency [47] and the Filipino government's countering of the Huk Rebellion. In the Philippine–American War, U.S. forces successfully quelled the Filipino insurgents by 1902, albeit with tactics considered unacceptable by the majority of modern populations.

See also

National doctrines

Case studies

Notes

  1. Alignments during the heaviest fighting years of the Iraq War were very complex, with some militias supporting the new Iraq government-US coalition, and some receiving third-state state sponsorship such as Saudi-supported Sunni group the Islamic State in Iraq.

Related Research Articles

<span class="mw-page-title-main">Guerrilla warfare</span> Form of irregular warfare

Guerrilla warfare is a form of unconventional warfare in which small groups of irregular military, such as rebels, partisans, paramilitary personnel or armed civilians including recruited children, use ambushes, sabotage, terrorism, raids, petty warfare or hit-and-run tactics in a rebellion, in a violent conflict, in a war or in a civil war to fight against regular military, police or rival insurgent forces.

<span class="mw-page-title-main">Asymmetric warfare</span> A war between belligerents whose relative military power differs significantly

Asymmetric warfare is a type of war between belligerents whose relative military power, strategy, or tactics differ significantly. This type of warfare often, but not necessarily, involves insurgents or resistance movement militias who may have the status of unlawful combatants against a standing army.

<span class="mw-page-title-main">Counterterrorism</span> Activity to defend against or prevent terrorist actions

Counterterrorism, also known as anti-terrorism, relates to the practices, military tactics, techniques, and strategies that governments, law enforcement, businesses, and intelligence agencies use to combat or eliminate terrorism.

<span class="mw-page-title-main">Unconventional warfare</span> Opposite of conventional warfare

Unconventional warfare (UW) is broadly defined as "military and quasi-military operations other than conventional warfare" and may use covert forces or actions such as subversion, sabotage, espionage, biowarfare, sanctions, propaganda or guerrilla warfare. This is typically done to avoid escalation into conventional warfare as well as international conventions.

Rebellion is a violent uprising against one's government. A rebel is a person who engages in a rebellion. A rebel group is a consciously coordinated group that seeks to gain political control over an entire state or a portion of a state.

<span class="mw-page-title-main">Police action</span> Military action undertaken without a declaration of war

In security studies and international relations, a police action is a military action undertaken without a formal declaration of war. In the 21st century, the term has been largely supplanted by "counter-insurgency". Since World War II, formal declarations of war have been rare, especially military actions conducted by the Global North during the Cold War. Rather, nations involved in military conflict sometimes describe the conflict by fighting the war under the auspices of a "police action" to show that it is a limited military operation, different from total war.

<span class="mw-page-title-main">2003–2006 phase of the Iraqi insurgency</span> Part of the Iraq War

After the 2003 invasion of Iraq was completed and the regime of Saddam Hussein was toppled in May 2003, an Iraqi insurgency began that would last until the United States left in 2011. The 2003–2006 phase of the Iraqi insurgency lasted until early 2006, when it escalated from an insurgency to a Sunni-Shia civil war, which became the most violent phase of the Iraq War.

Decapitation is a military strategy aimed at removing the leadership or command and control of a hostile government or group. The strategy of shattering or defeating an enemy by eliminating its military and political leadership has long been utilized in warfare.

Fourth-generation warfare (4GW) is conflict characterized by a blurring of the distinction between war and politics, and of the distinction between combatants and civilians.

<span class="mw-page-title-main">Counterinsurgency</span> Military operation aimed at defeating insurgent forces

Counterinsurgency is "the totality of actions aimed at defeating irregular forces". The Oxford English Dictionary defines counterinsurgency as any "military or political action taken against the activities of guerrillas or revolutionaries" and can be considered war by a state against a non-state adversary. Insurgency and counterinsurgency campaigns have been waged since ancient history. However, modern thinking on counterinsurgency was developed during decolonization.

<span class="mw-page-title-main">Iraqi civil war (2006–2008)</span> Middle Eastern Conflict 2006-2009

The Iraqi civil war was an armed conflict from 2006 to 2008 between various sectarian Shia and Sunni armed groups, such as the Islamic State of Iraq and the Mahdi Army, in addition to the Iraqi government alongside American-led coalition forces. In February 2006, the insurgency against the coalition and government escalated into a sectarian civil war after the bombing of Al-Askari Shrine, considered a holy site in Twelver Shi'ism. US President George W. Bush and Iraqi officials accused Al-Qaeda in Iraq (AQI) of orchestrating the bombing. AQI publicly denied any links. The incident set off a wave of attacks on Sunni civilians by Shia militants, followed by attacks on Shia civilians by Sunni militants.

Steven Kent Metz is an American author and professor of national security and strategy at the U.S. Army War College specializing in insurgency and counterinsurgency, American defense policy, strategic theory, the African security environment, and future warfare.

<span class="mw-page-title-main">David Galula</span> French Army officer and counterinsurgency theorist (1919–1967)

David Galula was a French military officer and scholar who was influential in developing the theory and practice of counterinsurgency warfare.

<span class="mw-page-title-main">David Kilcullen</span> Australian author

David John Kilcullen FRGS is an Australian author, strategist, and counterinsurgency expert who is currently the non-executive chairman of Caerus Associates, a strategy and design consulting firm that he founded. He is a professor at Arizona State University and at University of New South Wales, Canberra.

<span class="mw-page-title-main">Foreign internal defense</span> Approach to combating actual or threatened insurgency

Foreign internal defense (FID) is a term used by the military in several countries, including the United States, France, and the United Kingdom, to describe an integrated, or multi-country approach to combating actual or threatened insurgency in a foreign state. This foreign state is known as the Host Nation (HN) under the US doctrine. The term counter-insurgency is commonly used for FID.

<span class="mw-page-title-main">McCormick Magic Diamond</span> Counterinsurgency model

A variety of models for understanding insurgency and planning the counterinsurgency (COIN) response have been developed. One model that has become respected both in academic and military context is the "Magic Diamond" model developed by Gordon McCormick of the RAND Corporation. The model involved four key elements or players, with mirrored strategies for their interactions. Each element will have a "mirrored" strategy, in which the way in which it imposes or aids insurgency is one image, and where the way that it interacts with counterinsurgency is the reflection.

Irregular warfare (IW) is defined in United States joint doctrine as "a violent struggle among state and non-state actors for legitimacy and influence over the relevant populations." In practice, control of institutions and infrastructure is also important. Concepts associated with irregular warfare are older than the term itself.

The main strategy and tactics of guerrilla warfare tend to involve the use of a small attacking, mobile force against a large, unwieldy force. The guerrilla force is largely or entirely organized in small units that are dependent on the support of the local population. Tactically, the guerrilla army makes the repetitive attacks far from the opponent's center of gravity with a view to keeping its own casualties to a minimum and imposing a constant debilitating strain on the enemy. This may provoke the enemy into a brutal, excessively destructive response which will both anger their own supporters and increase support for the guerrillas, ultimately compelling the enemy to withdraw. One of the most famous examples of this was during the Irish War of Independence. Michael Collins, a leader of the Irish Republican Army, often used this tactic to take out squads of British soldiers, mainly in Munster, especially Cork.

Clear and hold is a counter-insurgency strategy in which military personnel clear an area of guerrillas or other insurgents, and then keep the area clear of insurgents while winning the support of the populace for the government and its policies. As defined by the United States Army, "clear and hold" contains three elements: civil-military operations, combat operations, and information warfare. Only highly strategic areas are initially chosen for "clear and hold" operations; once they are secure, the operation gradually spreads to less strategic areas until the desired geographic unit is under control. Once an area has been cleared, local police authority is re-established, and government authority re-asserted.

<span class="mw-page-title-main">Political violence</span> Violence conducted with political goals

Political violence is violence which is perpetrated in order to achieve political goals. It can include violence which is used by a state against other states (war), violence which is used by a state against civilians and non-state actors, and violence which is used by violent non-state actors against states and civilians. It can also describe politically motivated violence which is used by violent non-state actors against a state or it can describe violence which is used against other non-state actors and/or civilians. Non-action on the part of a government can also be characterized as a form of political violence, such as refusing to alleviate famine or otherwise denying resources to politically identifiable groups within their territory.

References

  1. 1 2 Fearon, James D.; Laitin, David D. (2003). "Ethnicity, Insurgency, and Civil War". American Political Science Review. 97 (1): 75–90. doi:10.1017/S0003055403000534. ISSN   1537-5943. S2CID   8303905.
  2. Lewis, Janet I. (2020). How Insurgency Begins: Rebel Group Formation in Uganda and Beyond. Cambridge University Press. pp. 17–18. doi:10.1017/9781108855969. ISBN   978-1-108-47966-0. S2CID   225014676.
  3. Kalyvas, Stathis N.; Balcells, Laia (2010). "International System and Technologies of Rebellion: How the End of the Cold War Shaped Internal Conflict". The American Political Science Review. 104 (3): 415–429. doi:10.1017/S0003055410000286. hdl: 10261/45454 . ISSN   0003-0554. JSTOR   40863761. S2CID   17605053.
  4. 1 2 3 4 5 Kocher, Matthew Adam; Pepinsky, Thomas B.; Kalyvas, Stathis N. (2011). "Aerial Bombing and Counterinsurgency in the Vietnam War". American Journal of Political Science. 55 (2): 201–218. doi: 10.1111/j.1540-5907.2010.00498.x . ISSN   1540-5907.
  5. 1 2 Kalyvas, Stathis N. (2006). The Logic of Violence in Civil War. Cambridge Studies in Comparative Politics. Cambridge: Cambridge University Press. doi:10.1017/cbo9780511818462. ISBN   978-0-521-85409-2. S2CID   14897960.
  6. These points are emphasized in many works on insurgency, including Peter Paret, French Revolutionary Warfare from Indochina to Algeria: The Analysis of a Political and Military Doctrine, Pall Mall Press, London, 1964.
  7. "The A to Z of military terms". The Economist. Retrieved 2023-12-18.
  8. Hall, Kermit L. The Oxford Guide to United States Supreme Court Decisions, Oxford University Press US, 2001 ISBN   0-19-513924-0, ISBN   978-0-19-513924-2 p. 246 "In supporting Lincoln on this issue, the Supreme Court upheld his theory of the Civil War as an insurrection against the United States government that could be suppressed according to the rules of war. In this way the United States was able to fight the war as if it were an international war, without actually having to recognize the de jure existence of the Confederate government."
  9. Staff. Bureau of Public Affairs: Office of the Historian -> Timeline of U.S. Diplomatic History -> 1861-1865:The Blockade of Confederate Ports, 1861-1865, U.S. State Department. "Following the U.S. announcement of its intention to establish an official blockade of Confederate ports, foreign governments began to recognize the Confederacy as a belligerent in the Civil War. Great Britain granted belligerent status on May 13, 1861, Spain on June 17, and Brazil on August 1. Other foreign governments issued statements of neutrality."
  10. Goldstein, Erik; McKercher, B. J. C. Power and stability: British foreign policy, 1865-1965, Routledge, 2003 ISBN   0-7146-8442-2, ISBN   978-0-7146-8442-0. p. 63
  11. Kalyvas, Stathis N.; Kocher, Matthew Adam (2007). "How "Free" Is Free Riding in Civil Wars? Violence, Insurgency, and the Collective Action Problem". World Politics. 59 (2): 177–216. doi: 10.1353/wp.2007.0023 . ISSN   0043-8871. JSTOR   40060186. S2CID   55598769.
  12. Long, Austin (2018), Gheciu, Alexandra; Wohlforth, William C. (eds.), "Counter Insurgency", The Oxford Handbook of International Security, Oxford University Press, pp. 546–561, doi:10.1093/oxfordhb/9780198777854.013.36, ISBN   978-0-19-877785-4
  13. Bahiss, Ibraheem; Jackson, Ashley; Mayhew, Leigh; Weigand, Florian (2022). "Rethinking armed group control: Towards a new conceptual framework" (PDF). ODI / Centre on Armed Groups.
  14. 1 2 Fearon, James (Summer 1995). "Rationalist Explanations for War". International Organization. 49 (3): 379–414. doi:10.1017/s0020818300033324. JSTOR   2706903. S2CID   38573183.
  15. 1 2 Walter, Barbara (March 31, 2014). "Why Bad Governance Leads to Repeat Civil War". Conflict Resolutions. 59 (7): 1242–1272. doi:10.1177/0022002714528006. S2CID   154632359.
  16. 1 2 Wood, Elisabeth (2003). Insurgent Collective Action and Civil War in El Salvador. New York: Cambridge University Press. pp. 1–30. ISBN   9780511808685.
  17. Tomes, Robert R. (2004), "Relearning Counterinsurgency Warfare" (PDF), Parameters
  18. 1 2 3 Mao Tse-tung (1967), "On Protracted War", Selected Works of Mao Tse-tung, Foreign Languages Press
  19. Trinquier, Roger (1961), Modern Warfare: A French View of Counterinsurgency, Editions de la Table Ronde, archived from the original on 2008-01-12
  20. Metz, Steven (5 June 2007), Rethinking Insurgency, Strategic Studies Institute, U.S. Army War College
  21. Secretary General's Policy Working Group on the United Nations and Terrorism (December 2004), "Preface" (PDF), Focus on Crime and Society, 4 (1 & 2), (A/57/273-S/2002/875, annex)
  22. Morris, Michael F. (2005), Al Qaeda as Insurgency (PDF), United States Army War College
  23. Marighella, Carlos (1969), Minimanual of the Urban Guerrilla
  24. Fall, Bernard B., "The Theory and Practice of Insurgency and Counterinsurgency", Naval War College Review (April 1965)
  25. 1 2 Rosenau, William (2007), Subversion and Insurgency, RAND National Defense Research Institute
  26. 1 2 Huntington, Samuel P. (1996). The Clash of Civilizations and the Remaking of World Order. Simon & Schuster. ISBN   978-0684811642.
  27. Fukuyama, Francis (May 2003), "Panel III: Integrating the War on Terrorism with Broader U.S. Foreign Policy", Phase III in the War on Terrorism: Challenges and Opportunities (PDF), Brookings Institution, archived from the original (PDF) on 2007-06-15
  28. Kilcullen, David (2004), Countering Global Insurgency: A Strategy for the War on Terrorism (PDF), archived from the original (PDF) on 2006-05-26
  29. Canonico, Peter J. (December 2004), An Alternate Military Strategy for the War on Terrorism (PDF), U.S. Naval Postgraduate School, archived from the original (PDF) on 2008-04-14
  30. Fjelde, Hanne; Nilsson, Desirée (September 2018). "The rise of rebel contenders: Barriers to entry and fragmentation in civil wars". Journal of Peace Research. 55 (5): 551–565. doi:10.1177/0022343318767497.
  31. 1 2 Cordesman, Anthony H. (29 October 2007), Security Cooperation in the Middle East, Center for Strategic and International Studies, archived from the original on 10 April 2008
  32. Bohorquez; et al. (December 2009), "Common Ecology Quantifies Human Insurgency", Nature, 462 (7275): 911–914, Bibcode:2009Natur.462..911B, doi:10.1038/nature08631, PMID   20016600, S2CID   4380248
  33. Clauset A, Gleditsch KS (2012), "The Developmental Dynamics of Terrorist Organizations", PLOS ONE, 7 (11): e48633, Bibcode:2012PLoSO...748633C, doi: 10.1371/journal.pone.0048633 , PMC   3504060 , PMID   23185267
  34. 1 2 3 4 5 Kilcullen, David (28 September 2006). Three Pillars of Counterinsurgency (PDF). U.S. Government Counterinsurgency Conference, Washington D.C.
  35. Lynn, John A. (July–August 2005), "Patterns of Insurgency and Counterinsurgency" (PDF), Military Review
  36. Headquarters, Department of the Army (22 February 2011) [27 February 2008]. FM 3–0, Operations (with included Change 1) (PDF). Washington, DC: GPO . Retrieved 31 August 2013.
  37. Edwards, Sean J.A. (September 2004), Swarming and the Future of War, PhD thesis, Pardee RAND Graduate School
  38. Eizenstat, Stuart E.; John Edward Porter; Jeremy M. Weinstein (January–February 2005), "Rebuilding Weak States" (PDF), Foreign Affairs, 84 (1): 134, doi:10.2307/20034213, JSTOR   20034213
  39. Sagraves, Robert D (April 2005), The Indirect Approach: the role of Aviation Foreign Internal Defense in Combating Terrorism in Weak and Failing States (PDF), Air Command and Staff College, archived from the original (PDF) on 2008-04-14
  40. Stuart Eizenstat et al, Rebuilding Weak States Archived 2011-06-04 at the Wayback Machine , Foreign Affairs, Council on Foreign Relations, January/February 2005. p. 136 (137 PDF)
  41. McCormick, Gordon (1987), The Shining Path and Peruvian terrorism, RAND Corporation, Document Number: P-7297. often called Magic Diamond
  42. Barnett, Thomas P.M. (2005), The Pentagon's New Map: The Pentagon's New Map: War and Peace in the Twenty-first Century, Berkley Trade, ISBN   978-0425202395, Barnett-2005
  43. McClintock, Michael (November 2005), Great Power Counterinsurgency, Human Rights First
  44. Cordesman, Anthony H. (August 1, 2006), The Importance of Building Local Capabilities: Lessons from the Counterinsurgency in Iraq, Center for Strategic and International Studies, archived from the original on April 10, 2008
  45. 1 2 3 Berman, Eli; Matanock, Aila M. (2015-05-11). "The Empiricists' Insurgency". Annual Review of Political Science. 18: 443–464. doi: 10.1146/annurev-polisci-082312-124553 .
  46. Berman, Eli; Callen, Michael; Felter, Joseph H.; Shapiro, Jacob N. (2011-08-01). "Do Working Men Rebel? Insurgency and Unemployment in Afghanistan, Iraq, and the Philippines". Journal of Conflict Resolution. 55 (4): 496–528. doi:10.1177/0022002710393920. ISSN   0022-0027. S2CID   30152995.
  47. Thomas Willis, "Lessons from the past: successful British counterinsurgency operations in Malaya 1948–1960", July–August 2005, Infantry Magazine